<< Prev Question Next Question >>

Question 74/270

An IS auditor concludes that a local area network's (LAN's) access security is satisfactory. In reviewing the work, the audit manager should:

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (270q)
Question 1: During a review of system access, an IS auditor notes that a...
Question 2: Which of the following would be the MOST efficient audit app...
Question 3: An organization has implemented a distributed security admin...
Question 4: A development team has designed a new application and incorp...
Question 5: An internal review reveals an out-of-support human resources...
Question 6: Which of the following is the BEST method for uncovering sha...
Question 7: The MOST effective method for an IS auditor to determine whi...
Question 8: A disk management system's PRIMARY function is to:...
Question 9: An IS auditor has found that a vendor has gone out of busine...
Question 10: Which of the following control? MOST efficiently ensures tha...
Question 11: A database administrator (DBA) extracts a user listing for a...
Question 12: An IS auditor has performed an agreed-upon procedures engage...
Question 13: Which of the following is MOST important when an incident ma...
Question 14: The IS auditor has identified a potential fraud perpetrated ...
Question 15: Which of the following is the KST source of information for ...
Question 16: Which of the following is MOST likely to result from complia...
Question 17: Which of the following is the BEST guidance from an IS audit...
Question 18: A complex IS environment which of the following tasks should...
Question 19: In reviewing the project timeline for a significant applicat...
Question 20: Which audit technique provides the GREATEST assurance that i...
Question 21: During a software acquision review, an IS auditor should rec...
Question 22: The BEST data backup strategy for mobile users is to:...
Question 23: Which of the following activities is MOST important to consi...
Question 24: When evaluating the recent implementation of an intrusion de...
Question 25: The lack of which of the following represents the GREATEST r...
Question 26: During an audit of identity and access management, an IS aud...
Question 27: Which of the following controls will BEST ensure that the bo...
Question 28: Which of the following is the MOST effective control to mini...
Question 29: Which of the following will BEST protect the confidentiality...
Question 30: Which of the following controls should be implemented to BES...
Question 31: Buffer overflow in an Internet environment is of particular ...
Question 32: Which of the following should an IS auditor recommend as MOS...
Question 33: Which of the following indicates the HIGHEST level of maturi...
Question 34: An organization was recently notified by its regulatory body...
Question 35: A typical network architecture used for e-commerce, a load b...
Question 36: During the implementation of an upgraded enterprise resource...
Question 37: In assessing the priority given to systems covered in an org...
Question 38: An IS auditor finds multiple situations where the help desk ...
Question 39: Which of the following key performance indicators (KPIs) pro...
Question 40: Which of the following is MOST important for the successful ...
Question 41: A security company and service provider have merged and the ...
Question 42: A region where an organization conducts business has announc...
Question 43: Which of the following should be of MOST concern to an IS au...
Question 44: The PRIMARY reason an IS department should analyze past inci...
Question 45: Which of the following should be the MOST important consider...
Question 46: Which of the following is MOST important to helping incident...
Question 47: An IS auditor is a member of an application development team...
Question 48: Overall responsibility for approving logical access rights t...
Question 49: An IS auditor performs a follow-up audit and learns the appr...
Question 50: During a help desk review, an IS auditor determines the call...
Question 51: During a review of an organization's network threat response...
Question 52: Which of the following is MOST helpful in preventing a syste...
Question 53: Which of the following activities is MOST important in deter...
Question 54: Which of the following is the BEST approach to identify whet...
Question 55: Which of the following should be an IS auditor's PRIMARY con...
Question 56: An organization recently experienced a phishing attack that ...
Question 57: Audit management has just completed the annual audit plan fo...
Question 58: The MOST important reason for documenting all aspects of a d...
Question 59: Which of the following would BEST assist senior management i...
Question 60: Which of the following is the PRIMARY purpose of documenting...
Question 61: An IS auditor has observed gaps in the data available to the...
Question 62: Requiring that passwords contain a combination of numeric an...
Question 63: Which of the following scenarios would enable a forensic inv...
Question 64: Which of the following is the BEST physical security solutio...
Question 65: Which of the following procedures would BEST contribute to t...
Question 66: An IS auditor performing an audit of backup procedures obser...
Question 67: A PRIMARY benefit derived by an organization employing contr...
Question 68: What is the MOST important business concern when an organiza...
Question 69: The MAJOR reason for segregating test programs from producti...
Question 70: An IS auditor is involved in the user testing phase of a dev...
Question 71: A large insurance company is about to replace a major financ...
Question 72: What is the purpose of a hypervisor?...
Question 73: An organization has implemented an automated match between p...
Question 74: An IS auditor concludes that a local area network's (LAN's) ...
Question 75: An IS auditor has found that an organization is unable to ad...
Question 76: Which of the following would be an auditor's GREATEST concer...
Question 77: During a review of a production schedule, an IS auditor obse...
Question 78: Which of the following should be of MOST concern to an IS au...
Question 79: An organization has software that is not compliant with data...
Question 80: While reviewing the project plan for a new system prior to g...
Question 81: Which of the following is the BEST way to minimize leakage o...
Question 82: Which of the following is MOST likely to be prevented by a f...
Question 83: Which of the following would be MOST important for an IS aud...
Question 84: An IS auditor performing an application development review a...
Question 85: A company laptop has been stolen and all photos on the lapto...
Question 86: An organization with high availability resource requirements...
Question 87: The CIO of an organization is concerned that the information...
Question 88: To ensure efficient and economic use of limited resources in...
Question 89: Which of the following would BEST indicate the effectiveness...
Question 90: Which of the following tasks should be performed during an o...
Question 91: During an audit, the client learns that the IS auditor has r...
Question 92: Which of the following is MOST important to the effective ma...
Question 93: An IS auditor notes that application super-user activity was...
Question 94: Which of the following is the MOST effective mechanism for e...
Question 95: Which of the following is the MOST important process to ensu...
Question 96: While planning a security audit, an IS auditor is made aware...
Question 97: Which of the following is BEST addressed when using a timest...
Question 98: Which of the following should be an IS auditor's FIRST actio...
Question 99: The FIRST step in establishing a firewall security policy is...
Question 100: Which of the following is the MOST important consideration w...
Question 101: Which of the following controls would BEST decrease the expo...
Question 102: MOST critical security weakness of a packet level firewall i...
Question 103: A company has implemented an IT segregation of duties policy...
Question 104: Which of the following is the MOST important consideration w...
Question 105: During an audit of a reciprocal disaster recovery agreement ...
Question 106: During an audit of the organization's data privacy policy, t...
Question 107: Which of the following is the MOST effective way to minimize...
Question 108: What would be an IS auditors GREATEST concern when using a t...
Question 109: An organization performs nightly backups but does not have a...
Question 110: Which of the following is the MOST effective control for a u...
Question 111: select a sample for testing, which must include the 80 large...
Question 112: Which of the following poses the GREATEST risk to the enforc...
Question 113: Which of the following should an IS auditor do FIRST when de...
Question 114: Which of the following BEST ensures that only authorized sof...
Question 115: A start-up company acquiring for its order-taking system is ...
Question 116: Which of the following would BEST provide executive manageme...
Question 117: In a follow-up audit, an IS auditor notes that management ha...
Question 118: An IS auditor is assessing an organization's data loss preve...
Question 119: An IT service desk has recorded several incidents related to...
Question 120: Which of the following is the FIRST step when conducting a b...
Question 121: Which of the following factors will BEST promote effective i...
Question 122: An employee transfers from an organization's risk management...
Question 123: A retirement system verifies that the field for employee sta...
Question 124: Which of the following is MOST important for the IS auditor ...
Question 125: Which of the following is the MOST effective way to assess w...
Question 126: Which of the following is a passive attack on a network?...
Question 127: Which of the following is the MOST effective way for an IS a...
Question 128: Which of the following is MOST important to include in an or...
Question 129: During a vulnerability assessment, an IS auditor finds a hig...
Question 130: An IS auditor has been asked to perform a post-implementatio...
Question 131: An IS auditor is using data analytics for an accounts payabl...
Question 132: An employee loses a mobile device resulting in loss of sensi...
Question 133: An organization has agreed to perform remediation related to...
Question 134: Which procedure provides the GREATEST assurance that correct...
Question 135: Which of the following human resources management practices ...
Question 136: An organization allows its employees to use personal mobile ...
Question 137: Following a breach, what is the BEST source to determine the...
Question 138: Inherent risk rating are determined by assessing the impact ...
Question 139: The BEST way to evaluate a shared control environment is to ...
Question 140: The grants management system is used to calculate grant paym...
Question 141: An IS auditor can BEST help management fulfill risk manageme...
Question 142: Which of the following would be of MOST concern during an au...
Question 143: Which of the following should be restricted from a network a...
Question 144: Which of the following control checks would utilize data ana...
Question 145: Which of the following is the MOST critical step prior to pe...
Question 146: Which of the following would be MOST critical for an IS audi...
Question 147: To ensure confidentiality through the use of asymmetric encr...
1 commentQuestion 148: An organization has recently converted its infrastructure to...
Question 149: During a review of an application system, an IS auditor iden...
Question 150: Which of the following should be reviewed as part of a data ...
Question 151: Which of the following management decisions presents the GRE...
Question 152: When migrating critical systems to a cloud provider, the GRE...
Question 153: Which of the following is MOST likely to enable a hacker to ...
Question 154: Which of the following is MOST helpful when establishing the...
Question 155: Which of the following is MOST influential when defining dis...
Question 156: When reviewing a disaster recovery plan (DRP) an IS auditor ...
Question 157: Which of the following could be used to evaluate the effecti...
Question 158: A vendor service level agreement (SLA) requires backup to be...
Question 159: Performance monitoring tools report that servers are consist...
Question 160: Which of the following presents the GREATEST concern when im...
Question 161: An organization offers an online information security awaren...
Question 162: Which of the following would be the MOST effective method to...
Question 163: Which of the following requires a consensus by key stakehold...
Question 164: Which of the following is the BEST detective control for a j...
Question 165: Which of the following is the BEST indicator that an applica...
Question 166: Loss-site scripting (XSS) attacks are BEST prevented through...
Question 167: Which the following is MOST critical for the effective imple...
Question 168: Which of the following approaches would utilize data analyti...
Question 169: Which of the following is the BEST approach for performing a...
Question 170: The quality assurance (QA) function should be prevented from...
Question 171: An IS auditor finds that periodic reviews of read-only users...
Question 172: Which of the following provides the BEST audit evidence that...
Question 173: While reviewing a hot site, the IS auditor discovers that on...
Question 174: Which of the following is the GREATEST concern associated wi...
Question 175: Which of the following would represent an acceptable test of...
Question 176: Which of the following is the BEST way to help ensure the se...
Question 177: mission-critical applications with a low recovery time objec...
Question 178: Which of the following procedures should an IS auditor compl...
Question 179: Which of the following could an IS auditor recommend to impr...
Question 180: An e-commerce enterprise's disaster recovery (DR) site has 3...
Question 181: An organization implements a data loss prevention tool as a ...
Question 182: When an intrusion into an organizations network is detected,...
Question 183: Which of the following would be the MOST effective method to...
Question 184: A CIO has asked an IS to implement several security controls...
Question 185: The maturity level of an organization s problem management s...
Question 186: When auditing the IT governance of an organization planning ...
Question 187: Which of the following would provide the BEST evidence of su...
Question 188: During an external assessment of network vulnerability, whic...
Question 189: Which of the following would BEST enable an IS auditor to pe...
Question 190: Which of the following findings should be an IS auditor's GR...
Question 191: The recovery time objective (RTO) is normally determined on ...
Question 192: Since data storage of a critical business application is on ...
Question 193: Which of the following is the BEST approach to help ensure e...
Question 194: An IS auditor has been asked to advise on the design and imp...
Question 195: A user of a telephone banking system has forgotten his perso...
Question 196: An organization using instant messaging to communicate with ...
Question 197: During an audit, which of the following would be MOST helpfu...
Question 198: Which of the following is the MOST important consideration f...
Question 199: A company uses a standard form to document and approve all c...
Question 200: Based on the Guidance of internal audit, an IT steering comm...
Question 201: During a review of an insurance company s claims system, the...
Question 202: The information security function in a large organization is...
Question 203: The objectives of business process improvement should PRIMAR...
Question 204: Which of the following is the BEST time for an IS auditor to...
Question 205: A technology service organization has recently acquired a ne...
Question 206: An organization s data retention policy states that all data...
Question 207: IS management has decided to replace the current single-serv...
Question 208: Which of the following should be an IS auditor's PRIMARY con...
Question 209: Which of the following is MOST important for an IS auditor t...
Question 210: Which of the following controls MOST effectively reduces the...
Question 211: Which of the following is the MOST effective control to miti...
Question 212: Which of the following is the BEST way to evaluate the effec...
Question 213: Which of the following could be determined by an entity-rela...
Question 214: Which of the following is the MOST important consideration w...
Question 215: Which of the following is the MOST significant risk associat...
Question 216: Which of the following is MOST important to ensure that elec...
Question 217: Which of the following would BEST prevent data from being or...
Question 218: An accounting department uses a spreadsheet to calculate sen...
Question 219: Which of the following is the BEST indicator of a mature qua...
Question 220: A legacy application is running on an operating system that ...
Question 221: Which of the following should be of GREATEST concern to an I...
Question 222: The objective of using coding standards for systems developm...
Question 223: When conducting a post implementation review which of the fo...
Question 224: An IS auditor finds that confidential company data has been ...
Question 225: The operations team of an organization has reported an IS se...
Question 226: The MOST efficient way to confirm that an ERP system being i...
Question 227: A security review focused on data loss prevention (DLP) reve...
Question 228: Which of the following would help determine the maturity of ...
Question 229: During an audit of information security procedures of a larg...
Question 230: Which of the following is the PRIMARY responsibility of an i...
Question 231: Which of the following is the MOST important factor when an ...
Question 232: Which of the following is the GREATEST benefit of implementi...
Question 233: An IS auditor finds that a company is using a payroll provid...
Question 234: internal IS auditor recommends that incoming accounts payabl...
Question 235: Which of the following is MOST likely to be included in a po...
Question 236: An organization has established hiring policies and procedur...
Question 237: An IS auditor was involved in the design phase for a new sys...
Question 238: Management has agreed to perform multiple remediation action...
Question 239: An IS auditor finds that firewalls are outdated and not supp...
Question 240: Performance monitoring tools report that servers are signifi...
Question 241: An IS auditor is observing transaction processing and notes ...
Question 242: Which of the following is MOST important for an IS auditor t...
Question 243: The MAIN reason an organization's incident management proced...
Question 244: An IS auditor would be concerned if the quality assurance (Q...
Question 245: The PRIMARY benefit of using secure shell (SSH) to access a ...
Question 246: Which of the following is MOST important to include in foren...
Question 247: An organization transmits large amount of data from one inte...
Question 248: An organization that has suffered a cyber attack is performi...
Question 249: Which of the following is an IS auditor's BEST course of act...
Question 250: An IS auditor is asked to review a large organization's chan...
Question 251: Which of the following is the PRIMARY benefit of including I...
Question 252: An organization has installed blade server technology in its...
Question 253: Which of the following audit procedures would be MOST conclu...
Question 254: An organization's plans to implement a virtualization strate...
Question 255: An IS auditor learns that after each scheduled batch process...
Question 256: A bank is relocating its servers to a vendor that provides d...
Question 257: An organization is considering outsourcing the processing of...
Question 258: Which of the following should an IS auditor be MOST concerne...
Question 259: An organization wants to reuse company-provided smartphones ...
Question 260: When evaluating whether the expected benefits of a project h...
Question 261: During an audit of a payroll system, an IS auditor identifie...
Question 262: An organization using instant messaging to communicate with ...
Question 263: Which of the following projects would be MOST important to r...
Question 264: Which of the following should be an IS auditor's FIRST activ...
Question 265: In a typical SDLC, which group is PRIMARILY responsible for ...
Question 266: During a network security review the system log indicates an...
Question 267: Which type of control is being implemented when a biometric ...
Question 268: When engaging services from external auditors, which of the ...
Question 269: An organization is replacing a mission-critical system. Whic...
Question 270: Which of the following is MOST important for an IS auditor t...